Splunk Enterprise Vulnerability: Arbitrary JavaScript Code Execution in Browser Context
CVE-2024-36997

4.6MEDIUM

Key Information:

Vendor
Splunk
Vendor
CVE Published:
1 July 2024

Summary

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.

Affected Version(s)

Splunk Cloud Platform 9.1.2312 < 9.1.2312.100

Splunk Enterprise 9.2 < 9.2.2

Splunk Enterprise 9.1 < 9.1.5

References

CVSS V3.1

Score:
4.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

STÖK / Fredrik Alexandersson
.